{"id":75,"date":"2018-12-11T17:37:01","date_gmt":"2018-12-11T09:37:01","guid":{"rendered":"http:\/\/115.159.161.242\/cn\/?page_id=75"},"modified":"2022-12-28T11:02:40","modified_gmt":"2022-12-28T03:02:40","slug":"security-awareness","status":"publish","type":"page","link":"https:\/\/www.cloudfall.cn\/en\/?page_id=75","title":{"rendered":"Security Awareness Education"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img2.jiemian.com\/101\/original\/20160830\/147253518266562100.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:300\">Why Choose Us\uff1f<\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-style:normal;font-weight:300\">Previously, we launched and realized our vision of fighting phishing through daily employee awareness training. Today, we have a full suite of phishing defense solutions that represent our focus on collaborating and building collective defenses for the organization.<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-style:normal;font-weight:300\">We combine market-leading incident response technology with employee-sourced attack intelligence to enable collective defense against email-based cyber attacks. With our products, you can disrupt attacks in a timely manner and always keep yourself ahead of attack flaws. Imagine that every user becomes a node on the network, providing actionable intelligence to the security team. Technology and users work together to create an unparalleled virtuous cycle of vigilance and response. A strong human presence can be coordinated with the speed of technology to quickly identify and eliminate threats.<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-style:normal;font-weight:300\"><strong>This is also the new state of collective defense<\/strong>, the purpose of cybersecurity &#8211; for crash testing every email. The move is intended to predict and disrupt the kill chain when an attack occurs, triggering enterprise-level detection and security automation and orchestration.<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-style:normal;font-weight:300\">Today, thousands of organizations around the world are making it all happen. Led by a team of pioneering cybersecurity experts, PhishOne enhances an organization&#8217;s ability to detect and actively participate in, respond to and mitigate attacks as they occur.<\/p>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-style:normal;font-weight:300\"><strong>Go from one to many and discover a new paradigm of cohesiveness and collaboration. Experience the power of the collective with PhishOne.<\/strong><br><br><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-id=\"1560\" src=\"http:\/\/www.cloudfall.cn\/wp-content\/uploads\/2019\/06\/\u610f\u8bc61.jpeg\" alt=\"\" class=\"wp-image-1560\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-id=\"1561\" src=\"http:\/\/www.cloudfall.cn\/wp-content\/uploads\/2019\/06\/\u521b\u65b0.jpeg\" alt=\"\" class=\"wp-image-1561\"\/><\/figure>\n<\/figure>\n\n\n\n<div class=\"wp-block-columns has-2-columns is-layout-flex wp-container-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center\" style=\"font-size:12px\">Focused on phishing &#8211; successfully blocking over 90% of vulnerabilities<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center\" style=\"font-size:12px\">Committed to providing the highest quality cybersecurity solutions and continuing to innovate through the patented technologies used in the solutions<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-2-columns is-layout-flex wp-container-8 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\"><strong>More than just &#8220;Awareness Training&#8221;<\/strong><\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">We practice the concept of learning by doing. It&#8217;s not like &#8220;computer-based training,&#8221; but rather like a traditional video that employees need to watch every month or quarter. We often find ourselves in this category &#8211; a square peg that fits into a round hole. While the market can&#8217;t put us in the box, they recognize our success.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\"><strong>More than just simulation<\/strong><\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">Our value lies in conditioning employees to identify and resist clicking on dangerous phishing emails.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">We believe the best information a company can gather &#8211; whether it&#8217;s customer data or attack intelligence &#8211; is from its employees. In particular, when it comes to phishing &#8211; the number one cause of data breaches &#8211; employees are the targets, and they can see the email attacks that are happening before the incident response team does.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">That&#8217;s why our solution focuses on leveraging organization-specific attack intelligence and reviewing it against known external phishing threat intelligence to get a fast, accurate picture of what&#8217;s happening across the organization.<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p><a href=\"http:\/\/www.cloudfall.cn\/wp-content\/uploads\/2019\/11\/Cloudfall-Phishing-Simulated-Service-Datasheet.pdf\">Cloudfall Phishing Simulated Service Datasheet <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why Choose Us\uff1f Previously, we launched and realized our [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":23,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/75"}],"collection":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=75"}],"version-history":[{"count":6,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/75\/revisions"}],"predecessor-version":[{"id":6588,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/75\/revisions\/6588"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/23"}],"wp:attachment":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}